Soft computing techniques for intrusion detection of SQL-based attacks

  • Authors:
  • Jaroslaw Skaruz;Jerzy Pawel Nowacki;Aldona Drabik;Franciszek Seredynski;Pascal Bouvry

  • Affiliations:
  • Institute of Computer Science, University of Podlasie, Siedlce, Poland;Polish-Japanese Institute of Information Technology, Warsaw;Polish-Japanese Institute of Information Technology, Warsaw;Polish-Japanese Institute of Information Technology, Warsaw and Institute of Computer Science, Polish Academy of Sciences, Warsaw, Poland;Faculty of Sciences Technology and Communication, University of Luxembourg, Luxembourg, Luxembourg

  • Venue:
  • ACIIDS'10 Proceedings of the Second international conference on Intelligent information and database systems: Part I
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

In the paper we present two approaches based on application of neural networks and Gene Expression Programming (GEP) to detect SQL attacks. SQL attacks are those attacks that take the advantage of using SQL statements to be performed. The problem of detection of this class of attacks is transformed to time series prediction and classification problems. SQL queries are used as a source of events in a protected environment. To differentiate between normal SQL queries and those sent by an attacker, we divide SQL statements into tokens and pass them to our detection system based on recurrent neural network (RNN), which predicts the next token, taking into account previously seen tokens. In the learning phase tokens are passed to a recurrent neural network (RNN) trained by backpropagation through time (BPTT) algorithm. Then, two coefficients of the rule are evaluated. The rule is used to interpret RNN output. In the testing phase RNN with the rule is examined against attacks and legal data to find out how evaluated rule affects efficiency of detecting attacks. The efficiency of this method of detecting intruders is compared with the results obtained from GEP.